Varonis debuts trailblazing features for securing Salesforce. Learn More

Introducing Athena AI our new generative AI layer for the Varonis Data Security Platform.

Learn more

Blog / Data Security

Data Security

What Is a Botnet? Definition and Prevention

Josue Ledesma

Josue Ledesma

Learn why botnets can be so dangerous and what your organization can do to protect your IoT devices and network.

SecurityRWD - Introduction to AWS Simple Storage Service (S3)

Kilian Englert

Kilian Englert

Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team compare and contrast Amazon Web Services S3 to traditional on-prem storage systems. Listen in as the team discusses how AWS S3 goes beyond basic data storage, and enables programmatic access to apps and services inside and outside the AWS environment.

SecurityRWD - Introduction to AWS Identity and Access Management (IAM)

Kilian Englert

Kilian Englert

Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team compare and contrast Amazon Web Services Identity and Access Management against a traditional on-prem setup with Active Directory. Listen in as the team discusses how AWS IAM goes beyond simple user and group management to creating an entire network and defining access to network resources and infrastructure.

SecurityRWD - Introduction to AWS Services

Kilian Englert

Kilian Englert

Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team kick off a new series diving into the various services found under the AWS umbrella. In this video, they introduce and provide an overview of some of the core services including IAM, S3, and EC2.

Common Types of Malware

Neil Fox

Neil Fox

This piece covers the various types of malware that are available and their characteristics.

SecurityRWD - Abusing Power Automate to Exfiltrate Data from Microsoft 365

Kilian Englert

Kilian Englert

Kilian Englert and Ryan O'Boyle from Varonis explore how a powerful, built-in tool called Power Automate can be configured to automatically exfiltrate data out of Microsoft 365 environments and what organizations can do to detect it..

SecurityRWD - Microsoft 365 Makes Collaboration Easy – Almost Too Easy

Kilian Englert

Kilian Englert

Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team examine different types of sharing in Microsoft 365, and what really happens behind the scenes.

Identify and Investigate Business Email Compromise (BEC) Scams

Ed Lin

Ed Lin

In this post, we'll review how to spot Business Email Compromise Scams and walk you through an investigation with Varonis.

SecurityRWD - What Happens When You Create A Microsoft Team?

Kilian Englert

Kilian Englert

Microsoft Teams seems like a straightforward collaboration platform, but the deceptive simplicity hides the true complexity lurking just under the surface.

SecurityRWD – Understanding Salesforce Entitlements

Kilian Englert

Kilian Englert

Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.

Threat Update 73 - What is a Cloud Access Security Broker (CASB)?

Kilian Englert

Kilian Englert

Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.

Threat Update 72 - What is SaaS Security Posture Management (SSPM)?

Kilian Englert

Kilian Englert

Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.

We're Varonis.
Our mission is to deliver meaningful security outcomes on autopilot.
No overhead. Just outcomes.